Author :
Liu, Yang ; Chen, Wenji ; Guan, Yong
Author_Institution :
Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA
Abstract :
There have been security problems and network failures that are hard to resolve, for example, botnets, polymorphic worm/virus, DDoS, etc. To address them, we need to monitor the traffic dynamics and have a network-wide view about them, and more importantly, be able to detect attacks and failures in a timely manner. Due to the rapid increase in the traffic volume, it is often infeasible to monitor every individual flow in the backbone network due to space and time constraints. Instead, we are often required to aggregate packets into a small number of flows and develop the detection methods with aggregated flows, namely aggregate queries. Although it enables ISPs to detect network problems in a timely manner, the flow aggregation cannot preserve certain critical information in network traffic, e.g., IP addresses, port numbers, etc. Due to such missing information, it becomes very difficult (or often infeasible) for ISPs to identify the sources of network attacks or the causes of traffic anomalies, which are important to resolve the network problems effectively. In this paper, we propose an efficient data structure, namely the fast sketch, which can both aggregate packets into a small number of flows, and further enable ISPs to identify the anomalous keys (IP addresses, port numbers, etc.), with small space and time. With it, the number of aggregated flows can achieve the lower bound of the heavy-change detection, i.e., Ω(k log(n/k)), where n is the range of flow keys and k is an upper bound of the number of anomalous keys. In addition, our sketch combines both the combinatorial group testing and the quotient technique to identify anomalous keys, which can guarantee a sub-linear running time. We expect our work will improve the practice for real-time traffic monitoring in a high-speed networked system.
Keywords :
IP networks; Internet; combinatorial mathematics; computer viruses; data structures; group theory; query processing; telecommunication security; telecommunication traffic; IP addresses; ISP; Internet service providers; anomalous keys identification; attack detection; backbone network; botnets; combinatorial group testing; data structure; failure detection; fast sketch; high-speed network traffic; high-speed networked system; network failures; packet aggregation; polymorphic virus; polymorphic worm; port numbers; query aggregation; quotient technique; real-time traffic monitoring; security problems; space constraints; sublinear running time; time constraints; traffic anomalies; traffic dynamic monitoring; Aggregates; IP networks; Internet; Monitoring; Protocols; Radiation detectors; Testing;